Dutch police say they took down 127 servers used by sanctioned hosting service

Avatar

Police in the Netherlands say they seized 127 servers this week that were used by Zservers, a bulletproof hosting service that was the subject of international sanctions issued Tuesday.

The raid on Wednesday at the Paul van Vlissingenstraat data center in Amsterdam “followed a long-term digital investigation into the activities of a hosting provider based there, called ZServers/XHost,” police said Thursday.

The sanctions announcements by the U.S., U.K. and Australia linked Zservers to the LockBit ransomware operation. Dutch police said their investigation also showed a link between the seized servers and the Conti cybercrime gang.

In addition to ransomware, the servers showed signs of related malware, including botnets, Dutch police said. 

“ZServers/XHost came into the focus of the investigation team a year ago. The company stood out because it advertised the possibility for customers to allow criminal acts from its servers,” the police statement said. “It was also stated that the owners of these servers would remain anonymous when law enforcement agencies would make inquiries with them, and payments for the services purchased could also be made anonymously via crypto currency.”

No arrests were announced. 

“The Cybercrime Team Amsterdam will, in consultation with the Public Prosecution Service, further investigate the data found on the seized servers,” Dutch police said.

The U.S. sanctions announcements labeled two Russian nationals — Alexander Igorevich Mishin and Aleksandr Sergeyevich Bolshakov — as administrators of Zservers. 

In addition to them, Britain listed four other employees as targets of sanctions, as well as Xhost Internet Solutions LP, described as a “UK front company”

CybercrimeGovernmentNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

An Italian journalist speaks about being targeted with Paragon spyware

Next Post

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Related Posts

New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs

Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local attackers to achieve privilege escalation and erase logs to cover up evidence of malicious activities. The issues have been uncovered in a binary named "schtasks.exe," which enables an administrator to create, delete, query, change,
Avatar
Read More